ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
1
Outage Probability and Outage-Based Robust Beamforming for MIMO Interference Channels with Imperfect Channel State Information
arXiv:1206.6172v1 [cs.IT] 27 Jun 2012
Juho Park, Student Member, IEEE, Youngchul Sung† , Senior Member, IEEE, Donggun Kim, Student Member, IEEE, and H. V. Poor Fellow, IEEE
Abstract In this paper, the outage probability and outage-based beam design for multiple-input multiple-output (MIMO) interference channels are considered. First, closed-form expressions for the outage probability in MIMO interference channels are derived under the assumption of Gaussian-distributed channel state information (CSI) error, and the asymptotic behavior of the outage probability as a function of several system parameters is examined by using the Chernoff bound. It is shown that the outage probability decreases exponentially with respect to the quality of CSI measured by the inverse of the mean square error of CSI. Second, based on the derived outage probability expressions, an iterative beam design algorithm for maximizing the sum outage rate is proposed. Numerical results show that the proposed beam design algorithm yields better sum outage rate performance than conventional algorithms such as interference alignment developed under the assumption of perfect CSI.
Index Terms Multiuser MIMO, interference channels, channel uncertainty, outage probability, Chernoff bound, interference alignment †
Corresponding author
J. Park, Y. Sung and D. Kim are with the Dept. of Electrical Engineering, KAIST, Daejeon 305-701, South Korea. Email:{jhp@, ysung@ee. and dg.kim@}kaist.ac.kr and H. V. Poor is with Dept. of Electrical Engineering, Princeton University, Princeton, NJ 08544, E-mail:
[email protected] This work was supported by the Korea Research Foundation Grant funded by the Korean Government (KRF-2008-220-D00079). A preliminary version of this work is presented at IEEE Globecom 2011. [1].
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
2
I. I NTRODUCTION Due to their importance in current and future wireless communication systems, multiple-input multipleoutput (MIMO) interference channels have gained much attention from the research community in recent years. Since Cadambe and Jafar showed that interference alignment (IA) achieved the maximum number of degrees of freedom in MIMO interference channels [2], there has been extensive research in devising good beam design algorithms for MIMO interference channels. Now, there are many available beam design algorithms for MIMO interference channels such as IA-based algorithms [3]–[5] and sum-rate targeted algorithms [3], [4], [6]–[9]. However, most of these algorithms assume perfect channel state information (CSI) at transmitters and receivers, whereas the assumption of perfect CSI is unrealistic in practical wireless communication systems since perfect CSI is unavailable in practical wireless communication systems due to channel estimation error, limited feedback or other limitations [10]. Thus, the CSI error should be incorporated into the beam design to yield better performance, and this is typically done under robust beam design frameworks. There are many robust beam design studies in the conventional single-user MIMO case and also in the multiple-input and single-output (MISO) multi-user case. In the MISO multi-user case, the problem is more tractable than in the MIMO multi-user case, and extensive research results are available on MISO broadcast and interference channels with imperfect CSI [11]–[13]; the outage rate region is defined for MISO interference channels in [11], and the optimal beam structure that achieves a Pareto-optimal point of the outage rate region is given in [12]. For more complicated MIMO interference channels, there are several pioneering works on robust beam design under CSI uncertainty [14]–[16]. In [14], the authors solved the problem based on a worst-case approach. In their work, the CSI error is modelled as a random variable under a Frobenius norm constraint, and a semi-definite relaxation method is used to obtain the beam vectors that maximize the minimum signal-to-interference-plus-noise ratio (SINR) over all users and all possible CSI error. In [15], on the other hand, the CSI error is modelled as an independent Gaussian random variable, and the beam is designed to minimize the mean square error (MSE) between the transmitted signal and the reconstructed signal at the receiver with given imperfect CSI at the transmitter (CSIT). In this paper, we consider the robust beam design in MIMO interference channels based on a different criterion. Here, we consider the rate outage due to channel uncertainty and the problem of sum rate maximization under an outage constraint in MIMO interference channels. This formulation is practically meaningful since an outage probability is assigned to each user and the supportable rate with the given
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
3
outage probability is maximized in practical systems. Here, we assume that the transmitters and receivers have imperfect CSI and the CSI error is circularly-symmetric complex Gaussian distributed. Under this assumption, we first derive closed-form expressions for the outage probability in MIMO interference channels for an arbitrarily given set of transmit and receive beamforming vectors, and then derive the asymptotic behavior of the outage probability as a function of several system parameters by using the Chernoff bound. It is shown that the outage probability decreases exponentially with respect to (w.r.t.) the quality of CSI measured by the inverse of the MSE of CSI, typically called the channel K factor [10] or interpreted as the Fisher information [17] in statistical estimation theory. In particular, it is shown that in the case of interference alignment, the outage probability can be made arbitrarily small by improving the CSI quality if the target rate is strictly less than the rate obtained by using the estimated as the nominal channel. Next, based on the derived outage probability expressions, we propose an iterative beam design algorithm for maximizing the weighted sum rate under the constraint that the outage probability for each user is less than a certain level. Numerical results show that the proposed beam design algorithm yields better sum outage rate performance than conventional beam design algorithms such as the ‘max-SINR’ algorithm [3] developed without the consideration of channel uncertainty. A. Related work The outage analysis for MIMO interference channels has been performed by several other researchers [16], [18]. In [16], the outage probability for a given rate tuple is computed under the assumption that the knowledge of the channel mean and covariance matrix are available, and transmit and receive beam vectors that minimize the power consumption for a given outage constraint are obtained. However, it is difficult to generalize this method of analysis to the case of multiple data streams per user, whereas our analysis includes the multiple data stream case. In [18], the outage probability and SINR distribution of each user in MIMO interference channels with the knowledge of channel distribution information are obtained under a particular transmit and receive beam structure of IA transmit beams and zero-forcing (ZF) receivers. On the other hand, our analysis can be applied to the case of general transmit and receive beam structures beyond IA and ZF. The probability distribution of a quadratic form of Gaussian random variables has been studied extensively in the statistics field [19]–[22] and in the communications area [23]–[25]. The most widelyused approach to obtain the probability distribution of a Gaussian quadratic form is the series fitting method [20], [21], [23], [26], which typically converges to the probability distribution of a Gaussian quadratic form from the lower tail first. However, the outage definition associated with robust beam design June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
4
for MIMO interference channels in this paper requires accurate computation of upper tail probabilities. The series expansion for the cumulative distribution function (CDF) obtained in this paper based on the integral form for the CDF in [25] and the residue theorem [22] is well suited to this purpose and converges to the upper tail first. Thus, the obtained series in this paper is more relevant for our outage analysis. For a detailed explanation of the derived series, please see Appendices B–C. B. Notation and organization We will make use of standard notational conventions. Vectors and matrices are written in boldface with matrices in capitals. All vectors are column vectors. For a matrix A, AH , kAkF and A(i, j) indicate the Hermitian transpose, the Frobenius norm and the element in row i and column j of A, respectively, and vec(A) and tr(A) denote the vector composed of the columns of A and the trace of A, respectively. For vector a, kak and [a]i represent the 2-norm and the i-th element of a, respectively. In stands for the identity matrix of size n (the subscript is included only when necessary), and diag(d1 , · · · , dn ) means a diagonal matrix with diagonal elements d1 , · · · , dn . x ∼ CN (µ, Σ) means that the random vector x has the circularly-symmetric complex Gaussian distribution with mean vector µ and covariance matrix √ Σ. K = {1, 2, · · · , K}, ι = −1, and |A| denotes the cardinality of the set A. The paper is organized as follows. The system model and problem formulation are described in Section II. In Section III, closed-form expressions for the outage probability are derived, and the behavior of the outage probability as a function of several system parameters is examined by using the Chernoff bound. In Section IV, an outage-based beam design algorithm is proposed. Numerical results are provided in Section V, followed by the conclusion in Section VI. II. S YSTEM M ODEL
AND
P ROBLEM F ORMULATION
In this paper, we consider a K -user time-invariant MIMO interference channel in which each transmitter equipped with Nt antennas is paired with a receiver equipped with Nr antennas, and interferes with all receivers other than the desired receiver. We assume that transmitter k transmits d (≤ min(Nt , Nr )) independent data streams to receiver k paired with transmitter k. Then, the received signal at receiver k is given by yk = Hkk Vk sk +
K X
Hki Vi si + nk ,
(1)
i=1,i6=k (1)
(d)
where Hki is the Nr × Nt channel matrix from transmitter i to receiver k; Vi = [vi , · · · , vi ] is the (m)
Nt × d transmit beamforming matrix with normalized column vectors at transmitter i, i.e., ||vi
|| = 1
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012 (1)
5
(d)
for m = 1, · · · , d; and si = [si , · · · , si ]T is the d × 1 symbol vector at transmitter i. We assume that the transmit symbol vector si is drawn from the zero-mean Gaussian distribution with unit variance, i.e., si ∼ CN (0, I), and the additive noise vector nk is zero-mean Gaussian distributed with variance σ 2 , i.e., nk ∼ CN (0, σ 2 I). We assume that the CSI available to the system is not perfect. That is, neither the
transmitters nor the receivers have perfect CSI. For the imperfect CSI, we adopt the following model ˆ ki + Eki Hki = H
(2)
ˆ ki is the channel state available to the for each (k, i) ∈ K × K, where Hki is the unknown true channel, H
transmitters and the receivers, and Eki is the error between the true and available channel information. For the CSI error Eki between the true and available channel information, we adopt the Kronecker error model which is widely used for MIMO systems to model the error correlation that may be caused by the transmit and receive antenna structure [10]. Under this model, the CSI error Eki is given by (w)
(w)
1/2
2 2 Eki = Σ1/2 r Hki Σt , with vec(Hki ) ∼ CN (0, σh I) for some σh ≥ 0,
(3)
where Σt and Σr are transmit and receive antenna correlation matrices, respectively, and the elements (w)
of Hki are independent and identically distributed (i.i.d.) and are drawn from a circularly-symmetric zero-mean complex Gaussian distribution. The CSI uncertainty matrix Eki is a circularly-symmetric1 complex Gaussian random matrix with distribution vec(Eki ) ∼ CN (0, σh2 (ΣTt ⊗ Σr )) [10, p.90], and
σh2 is the parameter capturing the uncertainty level in CSI. We assume that the Eki ’s are independent
across transmitter-receiver pairs (k, i). To specify the quality of CSI and signal reception, we define two parameters (ki)
Kch := (ki)
ˆ ki k2 ˆ kk k2 ˆ ki k2 kH kH kH (k) F F F and Γ := . = σ2 E{kEki k2F } σh2 tr(ΣTt ⊗ Σr )
Kch is the channel K factor defined as the ratio of the power of the known channel part to that of the
unknown channel part, representing the quality of CSI [10], and Γ(k) is the signal-to-noise ratio (SNR) ˆ to represent at receiver k since Vk and sk are normalized in our formulation. Hereafter, we will use H
ˆ ki , Σt , Σr } known to the transmitters and receivers. By using the collection of channel information {H (m)
the receiver filter uk
(m)
(||uk || = 1), receiver k projects the received signal yk in (1) to recover the
desired signal stream m: (m)
sˆk
1
(m) (m) ˆ kk + Ekk )Vk sk + = (uk )H yk = (uk )H (H
K X
i=1,i6=k
ˆ ki + Eki )Vi si + nk . (H
The circular symmetry of a random matrix in form of AZB with constant matrices A and B and a circularly-symmetric
complex Gaussian matrix Z can easily be shown by a similar technique to that used in the Appendix A. June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
6
We assume that the design of the transmit beamforming matrices {Vk , k ∈ K} and receive filters (d) (1) ˆ . This model of beam design and {Uk = [uk , · · · , uk ], k ∈ K} is based on the available CSI H
signal transmission and reception captures many coherent linear beamforming MIMO schemes including interference alignment and sum rate maximizing beamforming schemes [3], [6], [27] in which transmit and receive beamforming matrices are designed based on available CSI at transmitters and receivers. Under this processing model, the SINR for stream m of user k is given by (m) SINRk Hˆ = (m)
(4) (m)
|(uk )H Ekk vk |2 +
(m) ˆ kk v(m) |2 |(uk )H H k P P (m) H ˆ (j) 2 |(u ) ( H + E )v | + i6=k kk kk j6=m k k
Pd
j=1
(m)
(j)
ˆ ki + Eki )v |2 + σ 2 |(uk )H (H i
,
where the numerator of the right-hand side (RHS) in (4) is the desired signal power, and the first, second, third and fourth terms in the denominator of the RHS in (4) represent the interference purely by channel uncertainty, inter-stream interference, other user interference and thermal noise, respectively. ˆ is explicitly shown. Since the dependence is clear, the notation (Here, the dependence of SINR on H (m)
|Hˆ will be omitted hereafter.) Because the {Eki } are random, SINRk
is a random variable for given
ˆ and {Vk (H), ˆ Uk (H), ˆ k ∈ K}. Thus, an outage at stream m of user k occurs if the supportable rate H (m)
determined by the received SINR (4) is below the target rate Rk , and the outage probability is given by o n (m) (m) . ≤ Rk Pr{outage} = Pr log2 1 + SINRk
(5)
By rearranging the terms in (4), the outage event can be expressed as d K X X
(mj)H (mj) Xki Xki
i=1 j=1
where (mj)
Xki
(m)H
≥
|uk
ˆ kk v(m) |2 H k
(m)
2Rk
−1
− σ 2 =: τ,
u(m)H E v(m) , i = k and j = m, kk k k := (j) (m)H u ˆ ki + Eki )v , otherwise. (H i k
(6)
(7) (mj)
Since the {Eki } are circularly-symmetric complex Gaussian random matrices, {Xki
, i = 1, · · · , K, j =
1, · · · , d} are circularly-symmetric complex Gaussian random variables, and the left-hand side (LHS) of
(6) is a quadratic form of non-central Gaussian random variables. To simplify notation, we will use vector form from here on. In vector form, (6) can be expressed as (m)H
Xk
June 28, 2012
(m)
Xk
≥ τ,
(8)
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012 (m)
where Xk (m)
(m1)
(md)
(m1)
7
(md)
(m)
:= [Xk1 , · · · , Xk1 , Xk2 , · · · , XkK ]T . The elements of the mean vector µk (:= (m)
E{Xk }) of Xk
are given by (m)
[µk ](i−1)d+j
0, i = k, j = m, = u(m)H H ˆ ki v(j) , otherwise, i k (m)
for i = 1, · · · , K and j = 1, · · · , d, and the covariance matrix Σk
(m)
of Xk
(9)
is given by a block diagonal
matrix, since {Eki , i = 1, · · · , K} are independent for different values of i, i.e., (m)
Σk
(m)
:= E{(Xk
(m)
(m)
− E{Xk })(Xk
(m)
(m)
(m)
− E{Xk })H } = diag(Σk,1 , · · · , Σk,K ),
(10)
(m)
where the d × d sub-block matrix Σk,i is given by (1)H (1) (2)H (1) (d)H (1) v Σt vi vi Σt vi · · · vi Σt vi i (1)H (2) (2)H (2) (d)H (2) vi Σt vi vi Σt vi · · · vi Σt vi (m) (m) 2 (m)H Σk,i = σh (uk Σr uk ) .. .. .. .. . . . . (1)H (d) (2)H (d) (d)H (d) vi Σt vi vi Σt vi · · · vi Σt vi
(11)
for each i. (The proof of (11) is given in Appendix A.) In the following sections, we will derive closedform expressions for (5), investigate the behavior of the outage probability as a function of several parameters, and propose an outage-based beam design algorithm. III. T HE C OMPUTATION
OF THE
O UTAGE P ROBABILITY
In this section, we first derive a closed-form expression for the outage probability in the general case of the Kronecker CSI error model, and then consider special cases. After this, we examine the behavior of the outage probability as a function of several important system parameters based on the Chernoff bound.
A. Closed-form expressions for the outage probability For a Gaussian random vector X ∼ CN (µ, Σ) with the eigendecomposition of its covariance matrix
¯ for some given Q ¯ is given by [25] Σ = ΨΛΨH , the CDF of XH QX Z ∞ τ (ιω+β) 1 e−c e H¯ Pr{X QX ≤ τ } = dω 2π −∞ ιω + β det(I + (ιω + β)Q)
(12)
1/2 ¯ for some β > 0 such that I + βQ is positive definite, where Q = ΛH/2 ΨH QΨΛ , χ = Λ−1/2 ΨH µ −1 1 Q−1 χ. From here on, we will derive closed-form series expressions for the and c = χH I + ιω+β
CDF of the outage probability in several important cases by applying the residue theorem used in [22]
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
8
to the integral form (12) for the CDF. First, we consider the most general case of the Kronecker CSI error model. The outage probability in this case is given by the following theorem. (1)
(d)
Theorem 1: For given transmit and receive beamforming matrices {Vk = [vk , · · · , vk ]} and {Uk =
(d) (1) ˆ = {H ˆ ki , Σt , Σr }, the outage probability for stream m of user k [uk , · · · , uk ]} designed based on H (m)
with the target rate Rk
under the CSI error model (2) and (3) is given by (m)
(m)
Pr{outage} = Pr{log2 (1 + SINRk ) ≤ Rk } τ
= −
κ −( + X e λi i=1
Pκi
j=1
|χi(j) |2 )
λκi i
∞ X
n=κi −1
1 (n) 1 gi (0) n! (n − κi + 1)!
(j) 2 !n−κi +1 j=1 |χi |
Pκi
(13)
λi
where τ is given in (6); {λi , i = 1, · · · , κ} are all the distinct eigenvalues of the Kd × Kd covariance (m)
matrix Σk
(m)
in (10) with eigendecomposition Σk (j)
eigenvalue λi ; χi
(m)
(m)H
(m)
= Ψk Λk Ψk
; κi is the multiplicity2 of the
is the element of vector (m)
χk
(m)
1
(m)H
:= (Λk )− 2 Ψk
(m)
(14)
µk
corresponding to the j -th eigenvector of the eigenvalue λi (1 ≤ j ≤ κi ), i.e., it is the j -th element of (m)H
1
(λi Iκi )− 2 Ψk,i
λi .);
(m)
(m)
(m)
µk . (Ψk,i is a Kd × κi matrix composed of the eigenvectors of Σk
associated with
P (q) 2 (s−1/λi )λp Pκp | |χ exp − p q=1 p6=i 1+(s−1/λi )λp e κp · ; gi (s) = Q s − 1/λi p6=i 1 + (s − 1/λi )λp τs
(n)
(15)
and gi (s) is the n-th derivative of gi (s) w.r.t. s.
¯ = I and X(m) ∼ CN (µ(m) , Σ(m) ) in this case, we obtain the Proof: By using (12) and the facts Q k k k
outage probability for stream m of user k in an integral form as P Pκi sλi (j) 2 Z β+ι∞ sτ − κ j=1 |χi | ) i=1 1+sλi ( e e 1 (m)H (m) Qκ · Xk ≥ τ } = 1 − Pr{Xk ds, κi 2πι β−ι∞ s i=1 (1 + sλi )
where s = β + ιω (β > 0). The outage probability (16) can be expressed as a contour integral: P Pκi sλi (j) 2 I sτ − κ j=1 |χi | ) i=1 1+sλi ( e e 1 (m)H (m) Qκ · Xk ≥ τ } = 1 − Pr{Xk ds, κi 2πι C s i=1 (1 + sλi ) | {z }
(16)
(17)
=:F (s)
where C is a contour of integration containing the imaginary axis and the whole left half plane of the complex plane. By the residue theorem, the sum of the residues at singular points of F (s) which do not
have positive real parts yields the contour integral in (17) times 2πι. It is easy to see that the singular 2
(m)
Since Σk
June 28, 2012
is a normal matrix, we have Kd =
Pκ
i=1
κi .
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
9 (m)
(m)
points of F (s) are s = 0 and s = −1/λi , i = 1, · · · , κ. Since Σk,i are all positive-definite, Σk positive definite and λi > 0 for all i. So, the outage probability is given by κ X Res F (s) . Pr{outage} = 1 − Res F (s) + s=0
i=1
is
(18)
s=−1/λi
It is also easy to see from (17) that the residue of F (s) at s = 0 is ResF (s) = 1. To compute Res F (s), s=0
s=−1/λi
for each i we introduce Gi (s) defined as Gi (s) := F
1 s− λi
−
−
eτ (s−1/λi ) e · s − 1/λi
=
−( λτ +
= e
i
Pκi
j=1
λp (s−1/λi )
Pκ
Pκp |χ(q) |2 ) (
q=1 p p=1 1+λp (s−1/λi ) eτ (s−1/λi ) e · Qκ = κp s − 1/λi p=1 (1 + λp (s − 1/λi )) λi s−1 λi s
Pκi
|χi(j) |2
j=1
e
×
1 λi s
|
P
· Q
(λi s)κi
|χi(j) |2 )
−
e
|
Pκi
λp (s−1/λi ) p6=i 1+λp (s−1/λi )
p6=i (1
=:fi (s)
q=1
2 |χ(q) p |
+ λp (s − 1/λi ))κp {z } =:I1
(j) 2 j=1 |χi |
(λi s)κi {z
Pκp
eτ s × I1 . × s − 1/λi } | {z }
=:gi (s)
Now, the residue of F (s) at s = −1/λi is transformed to that of Gi (s) at s = 0. The Laurent series
expansion of fi (s) and the Taylor series expansion of gi (s) at s = 0 are given respectively by ∞ X 1 1 fi (s) = (λi s)κi n=0 n!
Pκi
(j)
j=1
|χi |2
λi s
!n
and
gi (s) =
∞ X 1 (n) gi (0)sn . n! n=0
(19)
By multiplying the two series and computing the coefficient of 1/s, we obtain the residue of Gi (s) at s = 0 as −( λτ +
Res Gi (s) = s=0
e
i
Pκi
j=1
λκi i
|χi(j) |2 )
∞ X
n=κi −1
1 (n) 1 gi (0) n! (n − κi + 1)!
(j) 2 !n−κi +1 j=1 |χi |
Pκi
λi
(20)
for each i. Finally, substituting the residues into (18) yields (13). (j)
To compute (13), we need to compute {λi }, {χi } and the higher order derivatives of gi (s). The first two terms are easy to compute since they are related with the mean vector of size Kd and the covariance matrix of size Kd×Kd. Furthermore, the higher order derivatives of gi (s) can also be computed efficiently (w)
based on recursion. (Please see Appendix C-A.) Note that in the case that the elements Hki in (3) have difference variances, (13) is still valid since the difference variances only change the covariance matrix (j)
(10) and the outage expression depends on the covariance matrix (10) through {λi } and {χi }. Next, we provide some useful corollaries to Theorem 1 regarding the outage probability in meaningful special cases. First, we consider the case in which a subset of channels are perfectly known at receiver k, ˆ ki and Eki = 0 for some i ∈ K. This corresponds to the case in which channel estimation i.e., Hki = H June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
10
or CSI feedback for some links is easier than that for other links. For example, the desired link channel may be easier to estimate than others. The outage probability in this case is given by the following corollary. Corollary 1: When perfect CSI for some channel links including the desired link is available at receiver ˆ ki = Hki for i ∈ Υk ⊂ K, the outage probability for stream m of user k is given by k, i.e., H (m)
(m)
Pr{outage} = Pr{log2 (1 + SINRk ) ≤ Rk } τ′
′
= −
κ −( + X e λi i=1
Pκi
j=1
|χi(j) |2 )
λκi i
∞ X
n=κi −1
1 (n) 1 g1,i (0) n! (n − κi + 1)!
(j) 2 !n−κi +1 j=1 |χi |
Pκi
(21)
λi
where τ ′ is defined below; {λi , i = 1, · · · , κ′ } is the set of all the distinct eigenvalues of the covariance P ′ (j) matrix (10); κi is the multiplicity of λi , satisfying (K − |Υk |)d = κi=1 κi ; χi is given in (14); and P (q) 2 (s−1/λi )λp Pκp ′ exp − p6=i 1+(s−1/λ |χ | p q=1 )λ eτ s i p κp g1,i (s) = · . Q s − 1/λi 1 + (s − 1/λ )λ i
p6=i
(22)
p
Proof: When CSI for some links including the desired link is perfect, the outage event at stream m of user k is given by
log2 1 + P
i∈Υk
(m)H
Pd
j=1, |uk
j6=m
ˆ ki v(j) |2 + H i
(m) (m)H ˆ Hkk vk |2 |uk P P (m)H ˆ (m) 2 Hki vi | + i∈Υc i∈Υk , |uk k i6=k
Pd
(m)H
j=1 |uk
(j)
ˆ ki + Eki )v |2 + σ2 (H i
≤ R(m) k
since Eki = 0 for i ∈ Υk . Thus, in this case the outage event is expressed in a quadratic form as
follows:
d XX
(mj)H
Xki
(mj)
Xki
i∈Υck j=1
(m)H
≥
|uk
2
ˆ kk v(m) |2 H k
(m) Rk
−1
−
d X X
i∈Υk j=1, j6=m
(m)H
|uk
ˆ ki v(j) |2 − H i
X
i∈Υk , i6=k
(m)H
|uk
ˆ ki v(m) |2 − σ 2 =: τ ′ , H i (23)
(mj)
and we have Xki
(m)
≡ 0 for all i ∈ Υk (See (7)). The size of Xk (m)
the size of the covariance matrix Σk
now reduces to (K − |Υk |)d, and
is (K − |Υk |)d × (K − |Υk |)d. With the new threshold τ ′ , the
same argument as that in Theorem 1 can be applied to yield the result. Thus, when perfect CSI is available for some links, the order of the distribution is reduced under the same structure. Next, consider the specific beam design method of interference alignment and the corresponding outage probability, which can be obtained by Corollary 1 and is given in the following corollary. Corollary 2: When the desired channel link is perfectly known (i.e. k ∈ Υk ) and {Vk } and {Uk } are
ˆ , the outage probability for stream m of user k is given by designed under IA based on H ′
κ X 1 − λτ ′ 1 (κ −1) i Pr{outage} = − g i (0). κi e λi (κi − 1)! 1,i
(24)
i=1
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
P
11
Pd
(mj)H (mj) (m) (m) Xki = (Xk )H Xk . j=1 Xki ˆ ki v(j) = 0 for ˆ , we have E{X(m) } = 0 since u(m)H H When the beam is designed under IA based on H i k k (m) (j) c all i ∈ K\{k} ⊃ Υk , j = 1, · · · , d. (See (9).) Hence, χk = 0 and thus χi = 0 for all i and j . (See
Proof: First, express the random term in (23) as
i∈Υck
(14).) Then, the terms in the infinite series in (21) are zero for all n > κi − 1 from the fact that 00 = 1 and 0! = 1, and the result follows. The outage probability for single stream communication is given in Corollary 3. (m)
Corollary 3: When d = 1 and all eigenvalues of Σk
are distinct, the outage probability for user k
is given by Pr{outage}
= =
Pr{log2 (1 + SINRk ) ≤ Rk } 2 n 2 K ∞ X e−(|χi | +τ /λi ) X 1 |χi |2 (n) − gi (0), λ n! λ i i n=0 i=1
where gi (s) in (15) reduces to gi (s) =
eτ s s−1/λi
·
superscripts since the stream index is unique.)
e
−
P
Q
(25)
λp (s−1/λi ) 2 p6=i 1+λp (s−1/λ ) |χp | i
p6=i
. (Here, we have omitted the stream
1+λp (s−1/λi )
Proof: Since all eigenvalues are assumed to be distinct, there are κ = K eigenvalues with κi = 1 for all i. Substituting these into Theorem 1 yields the result. Now, let us consider a simpler case for d = 1 with no antenna correlation. In this case, the outage probability is given as an explicit function of the channel uncertainty level σh2 , and it is given by the following corollary to Theorem 1. Corollary 4: When d = 1 and there is no antenna correlation, the outage probability is given by n−K+1 ∞ 1 kχk k2 1 −( στ2 +kχk k2 ) X 1 (n) h g (0) Pr{outage} = − 2 K e , (26) n! (n − K + 1)! (σh ) σh2 n=K−1
where χk = E{Xk }/σh and g(s) =
eτ s s−1/σh2 .
Proof: In this case, an outage at user k occurs if and only if XH k Xk ≥
2 ˆ |uH k Hkk vk | 2Rk −1
− σ 2 . Now, the
covariance matrix Σk of Xk is σh2 IK (see (10) and (11)), and thus there is only one eigenvalue σh2 with multiplicity K . Moreover, χk = E{Xk }/σh from (14) since Ψk = I and Λk = σh2 I. By substituting these into Theorem 1, the outage probability (26) is obtained. B. The behavior analysis of the outage probability based on the Chernoff bound The obtained exact expressions for the outage probability in the previous subsection can easily be computed numerically, and will be used for the robust beam design based on the outage probability in Section IV. Before we address the outage-based robust beam design problem, let us investigate June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
12
the behavior of the outage probability as a function of several parameters. Suppose that transmit and (m) (m) ˆ . For the given receive beam vectors {vk , uk } are designed by some known method based on H
beam vectors, as seen in the obtained expressions, the outage probability is a function of other system ˆ ki }, the noise variance σ 2 , the channel uncertainty level parameters such as the known channel mean {H (m) ˆ kk , σ 2 and σh2 , the antenna correlation Σt and Σr , and the target rate Rk . Here, the dependence on H (m)
Rk
ˆ ki , i 6= k} is ˆ kk , σ 2 , R(m) ), and the dependence on σ 2 , Σt , Σr and {H is via the threshold τ (H h k
(m)
(m)
(m)
(m)
ˆ ki )) and the eigenvalues of Σ (σ 2 , Σt , Σr ). This complicated via χk (Σk (σh2 , Σt , Σr ), E{Xk }(H h k,i
dependence structure makes it difficult to analyze the properties of the outage probability as a function of the system parameters. Thus, in this subsection we apply the Chernoff bounding technique [17] to the tractable3 case of d = 1 to obtain insights into the outage probability as a function of several important parameters. When d = 1, the outage event is expressed as X K 2 ˆ |uH H H 2 k Hkk vk | Pr Xk Xk ≥ τ = Xki Xki ≥ τ . −σ = Pr (2Rk − 1)
(27)
i=1
Since Ek1 , · · · , EkK are independent and circularly-symmetric complex Gaussian random matrices, Xk1 , · · · , XkK are independent and circularly-symmetric complex Gaussian random variables. (See (7).)
Thus, the term on the LHS in the second bracket in (27) is a sum of independent random variables, and the Chernoff bound can be applied to yield −τ s Pr{XH k Xk ≥ τ } ≤ e
QK
i=1 E
es|Xki |
2
(28)
2 )) is given by for any s > 0. The moment generating function (m.g.f.) of |Xki |2 (Xki ∼ CN (µki , σki 2 |µki |2 s H ˆ 2 2 E{es|Xki | } = 1−σ1 2 s exp 1−σ 2 s for s < 1/σki , where µkk = 0, µki = uk Hki vi for i 6= k , and σki = ki
ki
H σh2 (uH k Σr uk )(vi Σt vi ). (See (7,9,11).) Therefore, the Chernoff bound on the outage probability is given
by Pr{XH k Xk
K Y
1 |µki |2 s ≥ τ} ≤ e 2 s exp 1 − σ 2 s 1 − σki ki i=1 #) ( " K K 2s X X |µ | ki 2 log(1 − σki s) + = exp − τ s + 2 s−1 σki −τ s
i=1
(29)
i=1
2 }. Now, (29) provides a tool to analyze the behavior of the outage probability for 0 < s < mini {1/σki
as a function of several important parameters. The most desired property is the behavior of the outage 3
(m)
In certain cases of d > 1, Chernoff bound can still be obtained when each element in Xk
is independent of the others.
Such cases include the case that there is no antenna correlation and the transmit beam vectors are orthogonal as in the IA beam case. In this case, similar results to the case of d = 1 are obtained.
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
13
probability as a function of the channel uncertainty level. This behavior is explained in the following theorem. Theorem 2: When d = 1, as σh2 → 0, the outage probability decreases to zero, and the decay rate is given by Pr{outage} ≤ e−c1 · exp(−c2 /σh2 )
(30)
for some c1 and c2 > 0 not depending on σh2 , if the target rate Rk and the designed transmit and receive beam vectors {vk , uk } satisfy
¯ k = log2 Rk < R 1 + P K
i=1
2 ˆ |uH k Hkk vk | |µki
1−
(uH k
|2
Σ Σt vi ) Σr )tr(Σt )
tr(
H r uk )(vi
. 2 +σ
(31)
2 }). So, let s = 1/σ 2 tr(Σ )tr(Σ ) (< min {1/σ 2 } Proof: (29) is valid for any s ∈ (0, mini {1/σki t r i h ki
2 = σ 2 (uH Σ u )(vH Σ v ) ≤ σ 2 tr(Σ )tr(Σ ) for all i). Then, the since ||vk || = ||uk || = 1 and σki t r r k t i i h h k
exponent in (29) is given by X K K H X |µki |2 (uH τ k Σr uk )(vi Σt vi ) log 1 − − − 2 2 H H σh tr(Σt )tr(Σr ) i=1 tr(Σt )tr(Σr ) σ (uk Σr uk )(vi Σt vi ) − σh2 tr(Σt )tr(Σr ) i=1 h ( ) K K H X X (uH |µki |2 τ 1 k Σr uk )(vi Σt vi ) log 1 − − . + − 2 H σh tr(Σt )tr(Σr ) tr(Σt )tr(Σr ) (uH k Σr uk )(vi Σt vi ) − tr(Σt )tr(Σr ) i=1 i=1 {z } | {z } | −
=
(=:c2 )
(=:c1 )
2 Rk − 1) − σ 2 into the inequality c > 0 yields (31). ˆ Now, substituting τ = |uH 2 k Hkk vk | /(2
Theorem 2 states that the outage probability decays to zero as the CSI quality improves, more precisely, it decays exponentially w.r.t. the inverse of channel estimation MSE (or equivalently w.r.t. the channel ¯ k . In the Fisherian inference framework, the inverse of estimation K factor), if the target rate is below R
MSE is information. Thus, another way we can view the above is that the outage probability decays exponentially as the Fisher information for channel state increases, if the target rate is below a certain value. So, the outage probability due to channel uncertainty is another case in which information is the error exponent as in many other inference problems. In certain cases, the condition (31) can be ˆ are used at simplified considerably. For example, when interference-aligning beam vectors based on H
ˆ the transmitters and receivers, we have µki = uH k Hki vi = 0 for i 6= k in addition to µkk = 0, and the H ˆ vk | 2 condition is simplified to Rk < log2 1 + |uk Hσkk . Thus, in the case of interference alignment the 2
outage probability can be made arbitrarily small by improving the CSI quality if the target rate is strictly
ˆ kk as the nominal channel. Next, consider the outage behavior as less than the rate obtained by using H June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
14
2 2 ˆ the effective SNR, Γef f := |uH k Hkk vk | /σ , increases. Since the two terms determining the effective
SNR are contained only in τ , it is straightforward to see from (29) that Pr{outage} ≤ c3 exp (−c4 Γef f ) ,
(32)
for some c3 and c4 = sσ 2 /(2Rk − 1) > 0 not depending on Γef f . Finally, consider the case in which the target rate Rk decreases. One can expect that the outage probability decays to zero if the target rate decreases to zero. The decaying behavior in this case is given in the following theorem. Theorem 3: When d = 1, as Rk → 0, the outage probability decreases to zero, and the decay rate is given by
c7 Pr{outage} ≤ c6 exp − Rk 2 −1
c′7 = c6 exp − Rk + o(Rk )
(33)
for some c7 , c′7 > 0 not depending on Rk . The last equality is when Rk is near zero. H Proof: Let s be any positive constant contained in an interval (0, 1/ maxi {σh2 (uH k Σr uk )(vi Σt vi )}).
Then, the exponent in (29) becomes −τ s −
=
−
K X i=1
|
H log[1 − σh2 (uH k Σr uk )(vi Σt vi )s] −
{z
(=:c5 )
2 ˆ |uH k Hkk vk | − σ2 2 Rk − 1
!
s − c5 = −
K X i=1
|µki |2 s H sσh2 (uH k Σr uk )(vi Σt vi ) − 1 }
2 ˆ |uH k Hkk vk | s − c′5 . 2 Rk − 1
H ˆ c′7 vk | 2 = c exp − Hence, the Chernoff bound is given by Pr{outage} ≤ c6 exp − s|uk2RHkkk 6 Rk +o(Rk ) for −1
some c′7 > 0. The last equality is when Rk is near zero. In this case, we have 2Rk −1 = (log 2)Rk +o(Rk ) by Taylor’s expansion. IV. O UTAGE -BASED ROBUST B EAM D ESIGN
In this section, we propose an outage-based beam design algorithm based on the closed-form expresˆ is given for the sions for the outage probability derived in the previous section. Our assumption is that H
beam design, as mentioned earlier. Suppose that transmit and receive beamforming matrices {Vk , Uk }
ˆ . Based on the designed {Vk , Uk } are designed by using any available beam design method based on H
ˆ σ 2 }, one can compute and use a nominal rate for transmission. Since H ˆ is not perfect, and known {H,
however, an outage may occur depending on the CSI error if the nominal rate is used for transmission. Of course, the outage probability can be made small by making the transmission rate low or by improving the CSI quality, as seen in Section III-B. However, these methods are inefficient sometimes since we ˆ . Further, in many may have limitations in the CSI quality or need as high rate as possible for given H June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
15
wireless systems the target outage probability for transmission is determined and the data transmission is performed under such an outage constraint. Thus, we here consider the beam design problem when the outage probability is given as a system parameter. In particular, we consider the following per-stream ˆ: based beam design problem to maximize the sum ǫ-outage rate for given H
maximize
(m) (m) {vk },{uk }
K X d X
(m)
Rk
(34)
k=1 m=1
(m) (m) Pr{log2 (1 + SINRk Hˆ ) ≤ Rk } ≤ ǫ
subject to
(m)
(m)
kuk k = kvk k = 1,
(35)
∀k ∈ K, m = 1, · · · , d,
(36)
where the ǫ-outage rate for stream m of user k is the maximum rate satisfying (35). Like other beam design problems in MIMO interference channels, the simultaneous joint optimal design for all transmit and receive beam vectors for this problem also seems difficult. Hence, we propose an iterative approach to the above sum ǫ-outage rate maximization problem. The proposed method is explained as follows. In the (m)
(m)
first step, we initialize {vk } and {uk } properly (here a known beam design algorithm for the MIMO (1)
(d)
(1)
(d)
interference channel can be used), and then find optimal rate-tuple (R1 , · · · , R1 , R2 , · · · , RK ) that (m)
(m)
maximizes the sum for given {vk , uk } under the outage constraint. This step is performed based on (m)
the derived outage probability expressions in the previous section. Since designing each Rk
does not
(m)
affect others, this step can be done separately for each Rk . Since the outage probability for stream m (m)
(m)
of user k increases monotonically w.r.t. Rk , the optimal Rk
in this step is the rate with the outage (m)
probability ǫ. In the second step, for the obtained rate-tuple and receive beam vectors {uk } in the first (m)
step, we update the transmit beam vectors {vk } to minimize the maximum of the outage probabilities of all streams and all users. (Since the outage probabilities of all streams of all users are ǫ at the end of the first step, this means that the outage probability decreases for all streams and all users.) Here, we apply the alternating minimization technique [28] to circumvent the difficulty in the joint transmit beam design. (The change in one transmit beam vector affects the outage probabilities of other users.) That is, we optimize one transmit beam vector while fixing all the others at a time. We iterate this procedure from the first stream of transmitter 1 to the last stream of user K until this step converge. In the third (m)
step, we design the receive beam vector uk
to minimize the outage probability at stream m of user k (m)
with the rate-tuple determined in the first step and {vk } determined in the second step for each (k, m). This optimization can also be performed separately for each stream of each user since the receiver filter for one stream does not affect the performance of other streams. Finally, we go back to the first step with the updated transmit and receive beam vectors (in the revisited first step, the rate for each stream June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
16
will be increased by increasing the outage probability upto to ǫ again), and iterate the procedure until the sum ǫ-outage rate does not change. We have summarized the sum outage rate maximizing beam design algorithm in Table I. The Proposed Algorithm ˆ and allowed outage probability ǫ. Input: channel state estimate H (m)
(m)
0. Initialize {vk } and {uk } as sets of unit-norm vectors properly. PK Pd (1) (d) (m) 1. For given {Vk } and {Uk }, find (R1 , · · · , RK ) that maximizes k=1 m=1 Rk while the outage constraint is satisfied. (1)
(d)
(m)
(m)
2. Update {Vk = [vk , · · · , vk ]} for {Rk } and {Uk } given from step 1. (m)
(j)
•For pair (i, j), fix {vk , k = 1, · · · , K, m = 1, · · · , d}\{vi } and {Uk } and solve (j)
vi
(m)
= arg min max Pr{outagek }. v∈CNt
(37)
k,m
(Here, a commercial tool such as the matlab fminimax function can be used to solve (37) together with the derived outage expression.) •Iterate the above step from the first stream of transmitter 1 to the last stream of transmitter K until {V1 , · · · , VK } converges.
(m)
3. For receiver 1 to K, obtain the receive filter uk
that minimize the outage probability of (m)
stream m of receiver k for given {Vk } from step 2 and given Rk
from step 1. (Here,
again a commercial tool such as the matlab fmincon function can be used together with the derived outage expression.) 4. Go to step 1 and repeat the whole procedure until the algorithm converges. TABLE I T HE PROPOSED ALGORITHM FOR SUM ǫ- OUTAGE RATE MAXIMIZATION WITH CHANNEL UNCERTAINTY
Theorem 4: The proposed beam design algorithm converges. Proof: It is straightforward to see that the sum ǫ-outage rate increases monotonically for each iteration of the three steps of the proposed algorithm. Also, the maximum sum rate is bounded by the rate with perfect CSI. Hence, the algorithm converges by the monotone convergence theorem for real sequences.
V. N UMERICAL R ESULTS In this section, we provide some numerical results to validate our series derivation, to examine the outage probability as a function of several system parameters and to evaluate the performance of the June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
17
30 [Laguerre]
5 [Proposed] 15 [Proposed] 1
20 [Laguerre] 25 [Laguerre]
Pr{Y ≤ y}
0.8
0.6
10 [Proposed] 0.4
0.2
0 0
Empirical distribution Proposed expression Laguerre polynomial
≥ 20 [Proposed] 2
4
y
6
8
10
Comparison of two series expressions for the CDF of quadratic form of Gaussian random variables. X ∼ ¯ = [1, 0.5, 0, 0; 0.5, 1, 0, 0; 0, 0, 1, 0; 0, 0, 0, 1], and β = 2 for Laguerre series expansion. CN ([0.5, 0.5, 0.5, 0.5]T , 0.3I4 ), Q
Fig. 1.
(ki)
ˆ ki } randomly proposed beam design algorithm. For given Σt , Σr , Kch and Γ(k) , we first generated {H ˆ ki to yield kH ˆ ki k2 = Nt Nr for all according to zero-mean Gaussian distribution, and then scaled H F
(k, i). In this way, the channel K factor and the SNR were simply controlled by σh2 and σ 2 , respectively. ˆ ki } were generated as such, we generated {Eki } according to (3) and the true channel was After {H (ki)
determined by (2) if necessary4. For simplicity, we used Kch = Kch for all (k, i) and Γ(k) = Γ for all k.
First, Fig. 1 compares the convergence behavior of the derived series in this paper with that of the series fitting method [20], [21], [23], [26] based on the Laguerre basis functions for a given set of parameters shown in the label of the figure. It is seen that indeed our series converges from the upper tail first whereas the series fitting method converges from the lower tail first. (For a proof of this in the identity covariance matrix case, please refer to Appendix C-B.) Note that the series fitting method yields large error at the upper tail distribution even with a reasonably large number of terms. With this verification, next consider the outage behavior as a function of several system parameters. 4
ˆ ki } regarding the channel The computation of the closed-form outage probability requires only the channel statistics and {H
information, but for Monte Carlo runs we need to generate {Eki }.
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
K
ch
18
= 0.1
Outage Probability
1
K
ch
0.8
=1
0.6
K
0.4
ch
, + : ϒk = ∅
= 10
, x : ϒ = {k} k
: Kch = ∞ 0.2
K
ch
0 0
1
2
Kch = 1000
= 100
3
4
5
6
Target Rate [bits/channel use]
Fig. 2.
Outage probability versus the target rate Rk (K = 3, Nt = Nr = 2d = 2, Σt = Σr = I, Γ = 15 dB. Transmit and
receive beam vectors are obtained by the IIA algorithm in [3].)
ˆ ki } (randomly generated Fig. 2 shows the outage probability w.r.t. the target rate Rk for a given set {H
as above) with several different channel K factors, when K = 3, Nt = Nr = 2d = 2, Σt = Σr = I, Γ = 15 dB and the transmit and receive beam vectors were designed by the iterative interference alignment
(IIA) algorithm [3]. The solid and dotted lines represent the result of our analysis, and the markers + and × indicate the result of Monte Carlo runs for the outage probability. The theoretical outage curves in Fig. 2 were obtained by using (21) with the first 38 terms in the infinite series. It is seen that our analysis matches the result of Monte Carlo runs very well. The dashed line shows the outage performance when Kch = ∞, i.e., all transmitters and receivers have perfect CSI. In the case of Kch = ∞, we have a sharp
transition behavior across Rlimit determined by the SINR (4) with Eki = 0 for all (k, i). It is seen that the outage performance deteriorates from the ideal step curve of Kch = ∞, as the CSI quality degrades. The solid lines correspond to the outage performance for the finite values of Kch , when the CSI for all channel links is imperfect. It is seen that Kch = 100 (20 dB) yields reasonable outage performance compared with the perfect CSI case in this setup. Note that the gain in the outage probability by knowing the desired link perfectly is not negligible. (See the dotted lines.) Fig. 3 show the outage probability w.r.t. ˆ ki } with several different Kch , when K = 3, Nt = Nr = 2d = 4, the target rate Rk for a given set {H Σt = Σr = I, Γ = 25 dB and the transmit and receive beam vectors were designed by the IIA algorithm.
Similar behavior is seen as in the single stream case, i.e., the outage performance generally deteriorates
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
19
as Kch decreases. However, it is interesting to observe in the multiple stream case that sufficiently good but not perfect CSI quality yields better outage performance than the perfect CSI in the high outage probability regime. (See Fig. 3 (b).) This implies that in the multiple stream case the second term (i.e., the self inter-stream interference term) in the denominator of the SINR formula (4) is made smaller by Ekk ’s being negatively aligned with Hkk than in the case of Ekk ≡ 0. However, this is not useful in
system operation since the system is operated in the low outage probability regime. All the theoretical curves in Figures 3 (a) and (b) were obtained by (21) with the first 45 terms in the infinite series. Fig. 4 shows the outage probability curves when the transmit and receive beamforming vectors are respectively chosen as the right and left singular vectors corresponding to the largest singular value of the desired channel and the other parameters are identical to the case in Fig. 2. A similar outage probability behavior to the previous case is observed.
Kch = 104
Kch = 1 1
1
Kch = 3 × 104
0.8
Outage Probability
Outage Probability
Kch = 105
Kch = 10
0.6 , + : Υk = ∅ , x : Υk = {k}
0.4
: Kch = ∞
0.8
Kch = 106 Kch = ∞
Kch → ∞ 0.6
0.4
Kch → ∞
Kch = 100 0.2
0 0
0.2
Kch = 1000
1
2
3
4
5
6
7
Target Rate [bits/channel use]
(a) CDF Fig. 3.
0
4.7
4.8
4.9
5
Target Rate [bits/channel use]
(b) Residual error
Outage probability versus the target rate Rk (K = 3, Nt = Nr = 2d = 4, Σt = Σr = I, Γ = 25 dB. Transmit and
receive beam vectors are designed by the IIA algorithm in [3].)
ˆ for several values of the Next, the outage probability w.r.t. the channel K factor for a given set {H}
target rate Rk is shown in Fig. 5, where the outage probability along the y -axis is drawn in log scale. (The same setup as for Fig. 2 was used and the IIA algorithm is used for the transmit and receive beam design. Here, (21) with the first 38 terms in the infinite series was used to compute the analytic curves.) As predicted by Theorem 2, the outage probability indeed decays exponentially w.r.t. the channel K factor (equivalently, w.r.t. the inverse of σh2 ). The exponent depends on the target rate Rk ; the higher the target rate is, the smaller the exponent is. This decaying behavior is also predicted in Theorem 2; the June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
20
exponent c2 in (30) is proportional to τ , and τ is inversely proportional to the target rate Rk . It is seen that the outage probability does not decay as Kch increases, if Rk is larger than Rlimit . In addition to the exact outage probability, the Chernoff bound in this case is shown in Fig. 5 as the lines with dots and dashes. It is seen that the Chernoff bound is not very tight but the decaying slope is the same as that of the exact outage probability.
Outage Probability
1
0.8
0.6
Kch = 0.1 Kch = 10
0.4
Kch = 1 0.2
, +: ϒk=∅ , x: ϒ ={k} k
0 0
0.5
1
1.5
2
2.5
3
Target Rate [bits/channel use]
Fig. 4.
Outage probability versus the target rate Rk (K = 3, Nt = Nr = 2d = 2, Σt = Σr = I, Γ = 15 dB. Transmit and
receive beam vectors are respectively chosen as the right and left singular vectors corresponding to the largest singular value of the desired channel matrix.)
Figures 6 and 7 show the impact of antenna correlation on the outage probability. We adopted the exponential antenna correlation profile considered in [29], [30]. Under this model, the (i, j)-th element of the antenna correlation matrix Σt (or Σr ) in (3) is given by ρ|i−j|, where ρ ∈ [0, 1] is a parameter determining the correlation strength. Since tr(Σt ) = Nt and tr(Σr ) = Nr for this exponential antenna correlation model, we have the same transmit and receive powers as in the case of no antenna correlation, ˆ ki } as well as on Σt and Σr , i.e., Σt = I and Σr = I. Since the outage probability depends on {H ˆ ki } randomly in the way that we explained already, and averaged the we generated one hundred {H
corresponding 100 outage probabilities to see the impact of the error correlation only. Other aspects of the system configuration were the same as those for Figures 2 and 5. It is seen that the error correlation decreases the outage probability especially when the CSI quality is very bad, but the gain becomes negligible when the CSI quality is good. June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
21
5
10
0
Outage Probability
10
Υk = ∅ Υk = ∅ Υk = {k}
−5
Rk > Rlimit
10
−10
10
Rk = 4.11
Rk = 3.87 Rk = 3.38
−15
10
0
Rk = 2.66 200
400
600
800
1000
Channel K Factor, Kch
Fig. 5.
Outage probability versus Kch (K = 3, Nt = Nr = 2d = 2, Σt = Σr = I, Γ = 15 dB. Transmit and receive beam
vectors are designed by the IIA algorithm in [3].)
ρ=0
Average Outage Probability
Rk = 0.9
ρ = 0.4 ρ = 0.8
1
Kch = 1 Kch = 10
0.8
0.6
Rk = 0.6 0.4
Rk = 0.3 0.2
0 0
5
10
15
SNR, Γ [dB]
20
25
30
Fig. 6. Average outage probability versus Γ (K = 3, Nt = Nr = 2d = 2. Transmit and receive beam vectors designed by the IIA algorithm in [3].)
June 28, 2012
DRAFT
Average Outage Probability
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
22
1
0.8
Kch = 1
0.6 ρ=0
Kch = 10
ρ = 0.4
0.4
ρ = 0.8
Kch = 50
0.2
Kch = 100 0 0
Fig. 7.
5
10
15
SNR, Γ [dB]
20
25
30
Average outage probability versus Γ (K = 3, Nt = Nr = 2d = 2, Rk = 1.2. Transmit and receive beam vectors
designed by the IIA algorithm in [3].)
Finally, the performance of the proposed beam design algorithm maximizing the sum ǫ-outage rate was evaluated. As reference, we adopted the max-SINR algorithm and IIA algorithm in [3]. Although the max-SINR and IIA algorithms were originally proposed to design beam vectors with perfect channel ˆ as information, we applied the algorithms to design beam vectors by treating the imperfect channel H
the true channel. The ǫ-outage rate of the max-SINR algorithm (or the IIA algorithm) is defined as the maximum rate that can be achieved under the outage constraint of ǫ using the beam vectors designed by the max-SINR algorithm (or the IIA algorithm). Once {Vk } and {Uk } are designed by any design ˆ ki }, the outage probability corresponding to the designed beam vectors method for given Σt , Σr and {H
is easily computed as a function of the target rate Rk from Theorem 1. Thus, for the beam vectors designed by the max-SINR and IIA algorithms as well as for those designed by the proposed design algorithm in Section IV, the ǫ-outage rate Rk can easily be obtained. Figures 8 and 9 show the sum ǫˆ ki } for ǫ = 0.1 outage rate of the proposed beam design method averaged over thirty different sets of {H
and ǫ = 0.2, respectively, when K = 3, Nt = Nr = 2d = 2 and Σt = Σr = I for different Kch ’s. (The outage probability expression (26) with the first 40 terms was used to compute the outage probability.) It is seen that the proposed algorithm outperforms the IIA and max-SINR algorithms in all SNR, and the max-SINR algorithm shows good performance almost comparable to the proposed algorithm at low SNR. However, as SNR increases, the performance of the max-SINR algorithm degrades to that of the IIA algorithm (the two algorithm themselves converge as SNR increases) and there is a considerable gain
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
23
by exploiting the channel uncertainty.
8
Proposed algorithm max-SINR algorithm [3]
7
IIA algorithm [3] Kch = 0 dB
Sum Outage Rate [bits/channel use]
6
Kch = 10 dB Kch = 13 dB
5 4 3 2 1 0 0
Fig. 8.
5
10
15 SNR, Γ [dB]
20
25
30
Sum ǫ-outage rate for ǫ = 0.1 (K = 3, Nt = Nr = 2d = 2, Σt = Σr = I)
8
Proposed algorithm max-SINR algorithm [3]
7
IIA algorithm [3] Kch = 0 dB
Sum Outage Rate [bits/channel use]
6
Kch = 10 dB Kch = 13 dB
5 4 3 2 1 0 0
Fig. 9.
5
10
15 SNR, Γ [dB]
20
25
30
Sum ǫ-outage rate for ǫ = 0.2 (K = 3, Nt = Nr = 2d = 2, Σt = Σr = I)
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
24
VI. C ONCLUSION In this paper, we have considered the outate probability and the outage-based beam design for MIMO interference channels. We have derived closed-form expressions for the outage probability in MIMO interference channels under the assumption of Gaussian-distributed CSI error, and have derived the asymptotic behavior of the outage probability as a function of several system parameters based on the Chernoff bound. We have shown that the outage probability decreases exponentially w.r.t. the channel K factor defined as the ratio of the power of the known channel part and that of the unknown channel part. We have also provided an iterative beam design algorithm for maximizing the sum outage rate based on the derived outage probability expressions. Numerical results show that the proposed beam design method significantly outperforms conventional methods assuming perfect CSI in the sum outage rate performance. A PPENDIX A P ROOF
(11)
OF
(m)
The (p, q)-th element of Σk,i is given by (mp)
E{(Xki = (a)
(m)H
E{(uk
(p)
⊗ uk
(p)T
⊗ uk
E{(vi
(b)
=
σh2 (vi
(c)
=
σh2 (vi
(d)
σh2 (vi
(mq)
})(Xki
(m)H
Eki vi )(uk
(p)T
=
=
(mp)
− E{Xki
(mq)
− E{Xki
(q)
Eki vi )H }
(m)H
)vec(Eki )vec(Eki )H (vi
(m)H
)(ΣTt ⊗ Σr )(vi
(p)T
ΣTt ⊗ uk
(p)T
ΣTt vi
(q)T
(q)T
(m)H
(q)∗
})H }
(q)∗
Σr )(vi
)
(q)∗
(m)
⊗ uk ),
where vi (q)H
Σr uk ) = σh2 (vi
⊗ uk
) }
(m)H H
⊗ uk
(m) (e)
(m)H
(m)H H
⊗ uk
(p)
(q)T H
= (vi (m)H
Σt vi )(uk
)
(m)
Σr uk ).
Here, (a) is obtained by applying vec(ABC) = (CT ⊗ A)vec(B) to each of the two terms in the
expectation, (b) is by E{vec(Eki )vec(Eki )H } = σh2 (ΣTt ⊗ Σr ), (c) and (d) are by (A ⊗ B)(C ⊗ D) = (p)T
(AC ⊗ BD), and finally (e) is because vi
(q)∗
ΣTt vi
(m)H
and uk
(m)
Σr uk
are scalars.
A PPENDIX B D ISTRIBUTION
OF A
N ON -C ENTRAL G AUSSIAN Q UADRATIC F ORM
The contents in Appendices B and C are from the technical report WISRL-2012-APR-1, KAIST, ”A Study on the Series Expansion of Gaussian Quadratic Forms”.
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
25
A. Previous work and literature survey There exist extensive literature about the probability distribution and statistical properties of a quadratic form of non-central (complex) Gaussian random variables in the communications area and the probability and statistics community. Through a literature survey, we found that the main technique to compute the distribution of a central (or a non-central) Gaussian quadratic form is based on series fitting, which was concretely unified and developed by S. Kotz [20], [21], and most of other works are its variants, e.g., [23]. First, we briefly explain this series fitting method here. ¯ , where x ∼ CN (µ, Σ) with size n and Q ¯ =Q ¯ H . The Consider a Gaussian quadratic form xH Qx
first step of the series fitting method is to convert the non-central Gaussian quadratic form into a linear combination of chi-square random variables: ¯ = x Qx H
n X i=1
where zi
independent
∼
2
λi |zi + δi | =
n X
λi [Re(zi + δi )2 + Im(zi + δi )2 ],
(38)
i=1
¯ , µ and Σ. CN (0, 2) for i = 1, · · · , n, and {δi , λi } are constants determined by Q
Note that Re(zi ) ∼ N (0, 1) and Re(zi ) ∼ N (0, 1). Thus, the non-central Gaussian quadratic form is equivalent to a weighted sum of non-central Chi-square random variables of which moment generating function (MGF) is known. The MGF of a weighted sum of n independent non-central χ2 random variables with degrees of freedom 2mi and non-centrality parameter µ2i is given by Φ(s) = exp
n
n
n
n
i=1
i=1
i=1
o Y 1X 2 1X 1 µ2i − · µi + . 2 2 1 − 2λi s (1 − 2λi s)mi
(39)
Note here that Φ(−s) is nothing but the Laplace transform of the probability density function (PDF) of ¯ or equivalently Pn λi |zi + δi |2 . Now, the series fitting method expresses the PDF as an infinite xH Qx i=1
series composed of a set of known basis functions and tries to find the linear combination coefficients so that the Laplace transform of this series is the same as the known Φ(−s). Specifically, let the PDF be ¯ µ, Σ; y) = gn (Q,
∞ X
ck hk (y),
(40)
k=0
where {hk (y), k = 0, 1, · · · } is the set of known basis functions and {ck , k = 0, 1, · · · } is the set of linear combination coefficients to be determined. Here, to make the problem tractable, in most cases, the following conditions are imposed. First, the sequence {hk (y)} of basis functions is chosen among measurable complex-valued functions on [0, ∞] such that ∞ X k=0
June 28, 2012
|ck ||hk (y)| ≤ Aeby ,
y ∈ [0, ∞] almost everywhere,
(41)
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
Fig. 10.
26
Computation of the distribution of a Gaussian quadratic form
ˆ k (s) of hk (y) has a special form: where A and b are real constants. Second, the Laplace transform h ˆ k (s) = ξ(s)η k (s), h
(42)
where ξ(s) is a non-vanishing, analytic function for Re(s) > b, and η(s) is analytic for Re(s) > b and has an inverse function. The first condition is for the existence of Laplace transform and the second condition is to make the problem tractable. Finally, with the pre-determined {hk (y)} with the conditions, the coefficients {ck } are computed so that ¯ µ, Σ; y)) = L(gn (Q,
∞ X
ˆ k (s) = Φ(−s), ck h
(43)
k=0
where L(·) denote the Laplace transform of a function. Widely used {hk (y)} for the series expansion of the PDF of a quadratic form of non-central Gaussian random variables is as follows [20], [21]. n/2+k−1
1. (Power series): hk (y) = (−1)k (y/2) 2Γ(n/2+k) . 2. (Laguerre polynomials): hk (y) = g(n; y/β)[k!
June 28, 2012
Γ(n/2) (n/2−1) ]Lk (y/2β), βΓ(n/2 + k)
(44)
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
27 (n/2−1)
where g(n; y) is the central χ2 density with n degrees of freedom and Lk
(x) is the generalized
Laguerre polynomial defined by Rodriges’ formula (n/2−1)
Lk
(x) =
1 x −(n/2−1) dk −x k+1 e x e x k! dxk
for a > 1 and a positive control parameter β . For the detail computation of {ck }, please refer to [20], [21], [26]. The whole procedure is summarized in Fig. 10. Reference group 1 [Kotz-67a] S. Kotz, N. L. Johnson, and D. W. Boyd, “Series representation of distributions of quadratic forms in normal variables. I. Central Case,” Ann. Math. Statist., vol, 38, pp. 823 – 837, Jun. 1967. [Kotz-67b] S. Kotz, N. L. Johnson, and D. W. Boyd, “Series representation of distributions of quadratic forms in normal variables. II. Non-central Case,” Ann. Math. Statist., vol. 38, pp. 838 – 848, Jun. 1967. [Mathai-92] A. M. Mathai and S. B. Provost, Quadratic forms in random variables: Theory and applications, New York:M. Dekker, 1992. [Nabar-05] R. Nabar, H. Bolcskei, and A. Paulraj, “Diversity and Outage Performance of SpaceTime Block Coded Ricean MIMO Channels”, IEEE Trans. on Wireless Commun., vol. 4, no. 5, Sept. 2005. Reference group 2 [Pachares-55] J. Pachares, “Note on the distribution of a definite quadratic form,” Ann. Math. Statist., vol. 26, pp. 128 – 131, Mar. 1955. ⇒ Power series representation of quadratic form of central Gaussian random variables. [Shah-61] B. K. Shah and C. G. Khatri, “Distribution of a definite quadratic form for non-central normal variates,” Ann. Math. Statist., vol. 32, pp. 883 – 887, Sep. 1961. ⇒ Power series representation of quadratic form of non-central Gaussian random variables. [Shah-63] B. K. Shah, “Distribution of definite and of indefinite quadratic forms from a non-central normal distribution,” Ann. Math. Statis., vol. 34, pp. 186 – 190, Mar. 1963. ⇒ Extends [Gurland-55] to derive a representation of quadratic form of non-central Gaussian random vector with Laguerre polynomial. Double series of Laguerre polynomials is required. [Gurland-55] J. Gurland, “Distribution of definite and indefinite quadratic forms,” Ann. Math. Statist., vol. 26, pp. 122 – 127, Jan. 1955. ⇒ Provides a simple representation of quadratic form of central June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
28
Gaussian random vector in Laguerre polynomial. [Gurland-56] J. Gurland, “Quadratic forms in normally distributed random variables,” Sankhya: The Indian Journal of Statistics vol. 17, pp. 37 – 50, Jan. 1956. ⇒ CDF for the indefinite quadratic form of central random variable. [Ruben-63] H. Ruben, “A new result on the distribution of quadratic forms,” Ann. Math. Statist., vol. 34, pp. 1582 – 1584, Dec. 1963. ⇒ Represents the CDF of quadratic form of central and non-central
Gaussian random vector with central/non-central χ2 distribution function.
[Tiku-65] M. L. Tiku, “Laguerre series forms of non central χ2 and F distributions,” Biometrika, vol. 52, pp. 415 – 427, Dec. 1965. ⇒ Another series representaion with Laguerre polynomials. [Davis-77] A. W. Davis, “A differential equation approach to linear combinations of independent chi-squares,” J. of the Ame. Statist. Assoc. vol. 72, pp. 212 – 214, Mar. 1977. ⇒ Provides another series representation with power series. [Imhof-61] J. P. Imhof, “Computing the distribution of quadratic forms in normal variables,” Biometrika vol. 48, pp. 419 – 426, Dec. 1961. ⇒ Provides a numerical method of computing the distribution [Rice-80] S. O. Rice, “Distribution of quadratic forms in normal variables - Evaluation by numerical integration,” SIAM J. Scient. Statist. Comput., vol. 1, no. 4, pp. 438 – 448, 1980. ⇒ Another numerical method of computing distribution. [Biyari-93] K. H. Biyari and W. C. Lindsey, “Statistical distribution of Hermitian quadratic forms in complex Gaussian variables,” IEEE Trans. Inform. Theory, vol. 39, pp. 1076 – 1082, Mar. 1993. ⇒ Series expansion of multi-variate complex Gaussian random variables. This paper deals with the
case that the Hermitian matrix in the quadratic form is a special block-diagonal matrix. Reference group 3 [Raphaeli-96] D. Raphaeli, “Distribution of noncentral indefinite quadratic forms in complex normal variables,” IEEE Trans. Inf. Theory, vol. 42, pp. 1002 – 1007, May 1996. [Al-Naffouri-09] T. Al-Naffouri and B. Hassibi, “On the distribution of indefinite quadratic forms in Gaussian random variables,” in Proc. of IEEE Int. Symp. Inf. Theory, (Seoul, Korea), Jun.–Jul. 2009.
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
29
B. The difference of our work from the previous works First, let us remind our outage event in MIMO interference channels. From equations (5), (6) and (7), we have Pr{outage} = Pr (mj)
where Xki
d K X X
(mj)H
Xki
(mj)
Xki
i=1 j=1
(m)H
≥
|uk
ˆ kk v(m) |2 H k
(m) 2Rk
−1
− σ 2 =: τ
,
(45)
is a non zero-mean Gaussian random variable. Note that the outage probability is an upper P (mj)H (mj) tail probability of the distribution of the Gaussian quadratic form dj=1 Xki Xki . However, as seen
in Fig. 11, the most widely-used series fitting method explained in the previous subsection yields a good approximation of the distribution at the lower tail not at the upper tail. The discrepancy between the
series and the true PDF is large at the upper5 tail for a truncated series. On the other hand, our approach yields a good approximation to the true distribution at the upper tail. Thus, the proposed series is more relevant to our problem than the series fitting method. Our approach to the upper tail approximation is based on the recent works by Raphaeli [22] and by Al-Naffouri and Hassibi [25]. First, let us explain Raphaeli’s method. The procedure in Fig. 10 up to obtaining the MGF of the Gaussian quadratic form is common to both the sequence fitting method and Raphaeli’s method. However, Raphaeli’s method obtains the PDF by direct inverse Laplace transform of the MGF Φ(s). Typically, the inverse Laplace transform of the MGF is represented as a complex contour integral and then the complex contour integral is computed as an infinite series by the residue theorem. However, to obtain the cumulative distribution function (CDF), which is actually necessary to compute the tail probability, Raphaeli’s method requires one more step, the integration of the PDF, to obtain the CDF since the MGF Φ(s) is the Laplace transform of the PDF. To obtain the CDF of a general Gaussian quadratic form, we did not use the MGF Φ(s), which is a bit complicated and requires an additional step, like Raphaeli, but instead we directly used a simple contour integral for the CDF (12), obtained by Al-Naffouri and Hassibi [25].6 Then, the contour integral was computed as an infinite series by the residue theorem. (Using the residue theorem is borrowed from 5
In the case of the problem considered in [23], the outage defined in [23] is associated with the lower tail of the distribution
and thus the series fitting method is well suited to that case. However, our system setup and considered problem are different from those in [23]. 6
In [25], Al-Naffouri and Hassibi obtained the contour integral, (12) for the CDF of a Gaussian quadratic form. However,
they did not obtain closed-form series expressions for the contour integral in general cases except a few simple cases. The main goal of [25] was to derive a nice and simple contour integral form for the CDF.
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
30
5 [Proposed]
30 [Laguerre]
5 [Proposed] 15 [Proposed]
1
1
15 [Proposed]
20 [Laguerre]
10 [Laguerre]
0.6 10 [Proposed] 0.4
25 [Laguerre]
0.6 10 [Proposed] 0.4
0.2
Empirical distribution Proposed expression Laguerre polynomial
≥ 20 [Proposed, Laguerre] 0 0
2
4
y
6
8
10
(a) Fig. 11.
0.8
5 [Laguerre] Pr{Y ≤ y}
Pr{Y ≤ y}
0.8
0.2
Empirical distribution Proposed expression Laguerre polynomial
≥ 20 [Proposed] 0 0
2
4
y
6
8
10
(b)
¯ = Series fitting method versus direct inverse Laplace transform method: number of variables = 4, µ = 0.51, Q
[1, 0.5, 0, 0; 0.5, 1, 0, 0; 0, 0, 1, 0; 0, 0, 0, 1], and Σ = 0.3I. (a) β = 1 and (b) β = 2. (β is the control parameter for the Laguerre polynomials in (44).) Note that the convergent speed of the series fitting method based on the Laguerre polynomials depends much on β. In the case of β = 2, the series fitting method based on the Laguerre polynomials yields large errors at the upper tail. It is not simple how to choose β and an efficient method is not known. (One cannot run simulations for empirical distributions for all cases.) The series fitting method based on the power series shows bad performance, and it cannot be used in practice.
Raphaeli’s work.) Thus, our result is simpler than Raphaeli’s approach and does not require the integration of a PDF for the CDF. As mentioned already, the series expansion in this paper has a particular advantage over the series fitting method considered in [23] for the outage event defined in this paper; The series in this paper fits the upper tail of the distribution well with a few number of terms. We shall provide a detailed proof for this in a special case in the next subsection. Thus, our series expressions for outage probability in MIMO interference channels are meaningful and relevant.
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
31
A PPENDIX C C OMPUTATIONAL I SSUES
C ONVERGENCE
AND
OF THE
O BTAINED S ERIES
A. Computing higher order derivatives The general outage expression in Theorem 1 is given by (m)
(m)
Pr{outage} = Pr{log2 (1 + SINRk ) ≤ Rk } τ
= −
where
κ −( + X e λi i=1
Pκi
j=1
|χi(j) |2 )
λκi i
∞ X
n=κi −1
1 (n) 1 gi (0) n! (n − κi + 1)!
(j) 2 !n−κi +1 j=1 |χi |
Pκi
λi
P (q) 2 (s−1/λi )λp Pκp |χ | exp − p6=i 1+(s−1/λ p q=1 i )λp κp · . gi (s) = Q s − 1/λi p6=i 1 + (s − 1/λi )λp eτ s
(46) ,
(47)
To compute (46), we need to compute • •
{λi } (the eigenvalues of the Kd × Kd covariance matrix Σ = ΨΛΨH ), (j)
{χi } (the elements of Kd vector χ = Λ−1/2 ΨH µ, where µ is the mean vector of the Gaussian
distribution), •
and the higher order derivatives of gi (s). (j)
The computation of {λi } and {χi } is simple since the sizes of the mean vector and the covariance matrix are Kd and Kd × Kd, respectively. Furthermore, the higher order derivatives of gi (s) can also be computed efficiently based on recursion [26], [22]. Note that gi (s) = elog gi (s) . Thus, the derivative of
gi (s) can be written as (1)
gi (s) = gi (s)[log gi (s)](1) , (2)
(1)
gi (s) = gi (s)[log gi (s)](1) + gi (s)[log gi (s)](2) ,
.. . (n) gi (s)
n−1 X n − 1 (l) = gi (s)[log gi (s)](n−l) , l l=0
(l)
n≥1
(48)
where gi (s) and [log gi (s)](l) denote the l-th derivatives of gi (s) and log gi (s), respectively. Here, [log gi (s)](n) can be computed from (47) as (n)
[log gi (s)]
κp X X (n − 1)!(−1)n−1 κp λnp n!(−1)n−1 λnp (n − 1)!(−1)n−1 X (q) 2 = τ δ1n − |χp | − − (s − 1/λi )n (1 + λp (s − 1/λi ))n+1 (1 + λp (s − 1/λi ))n p6=i
q=1
p6=i
(l)
where δ1n is Kronecker delta function. Thus, for given gi (s) and [log gi (s)](l) , we can compute gi (s) efficiently in a recursive way, as shown in (48). June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
32
B. Convergence analysis In this subsection, we provide some convergence analysis on the derived series expansion in Sec. III. Consider the general result in Theorem 1 for the CDF of a Gaussian quadratic form: Pκi (j) P κi (j) 2 !n−κi +1 κ ∞ −( y + j=1 |χi |2 ) X X e λi 1 (n) 1 j=1 |χi | Pr{Y ≤ y} = 1 + g (0, y) λκi i n! i (n − κi + 1)! λi n=κi −1 i=1 (49) where esy
gi (s, y) =
s − λ−1 i
P (q) 2 (s−1/λi )λp Pκp exp − p6=i 1+(s−1/λ |χ | p q=1 i )λp κp . · Q 1 + (s − 1/λ )λ i p p6=i
Here, we explicitly use the variable y as an input parameter of the function gi (s) for later explanation. (n)
gi (s, y) denotes the n-th partial derivative of gi (s, y) with respect to s. (Here, κ is the number of
distinct eigenvalues of the Kd × Kd covariance matrix Σ and κi is the geometric order of eigenvalue P λi . κi=1 κi = Kd.) The residual error caused by truncating the infinite series after the first N terms is
given by
y
RN (y) =
κ −( + X e λi i=1
Pκi
j=1
|χi(j) |2 )
λκi i
∞ X
n=N +1
1 (n) 1 gi (0, y) n! (n − κi + 1)!
(j) 2 !n−κi +1 j=1 |χi |
Pκi
λi
,
(50)
and we have Pr{Y ≤ y; infinite sum} = Pr{Y ≤ y; truncation at N } + RN (y).
The truncation error RN (y) can be expressed as RN (y) =
κ X
i RN (y),
(51)
i=1
where i RN (y)
−( λy +
=
e
i
Pκi
j=1
|χi(j) |2 )
λκi i
∞ X
n=N +1
1 1 (n) g (0, y) n! i (n − κi + 1)!
(j) 2 !n−κi +1 j=1 |χi |
Pκi
λi
(52)
i (y)| in the truncation error is bounded as for each 1 ≤ i ≤ κ. Then, the magnitude of each term |RN Pκi X (j) 2 !n−κi +1 ∞ κi X |χ 1 y 1 1 (j) j=1 i | (n) i |RN (y)| ≤ κi exp − |χi |2 · + . gi (0, y) · λi λi n! (n − κi + 1)! λi j=1
n=N +1
(53)
As seen in Fig. 11, our series expansion fits the upper tail distribution first. Now, to assess the overall convergence speed of our series, for the same step as in Fig. 11, we ran some simulations to obtain an
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
33
empirical distribution, and computed the overall mean square error (MSE) between the truncated series and the empirical distribution over 0 ≤ y ≤ 10 as CDF MSE =
200 2 1 X Pr{Y ≤ yi ; N, type of series} − Pr{Y ≤ yi ; empirical} , 200 i=1
where {yi } are the uniform samples of [0, 10]. Fig. 12 shows the CDF MSE of the three methods in Fig. 11: the proposed series, the series fitting method with β = 1 and the series fitting method with β = 2. It is seen in Fig. 12 that the overall convergence of the proposed series can be worse than
0
10
−2
CDF MSE
10
−4
10
−6
10
−8
10
Proposed expression Laguerre polynomial (β=1) Laguerre polynomial (β=2)
0
Fig. 12.
10
20 Order
30
40
CDF MSE of the CDFs in Fig. 11
the series fitting method at the small values for the number of summation terms for the setting in Fig. 11. The bad overall convergence is due to worse fitting at the lower tail of the distribution, but the bad lower tail approximation is not important to our outage computation. (Please see Fig. 11.) Fig. 13 shows another case. In this case, the proposed series outperforms the series fitting method both in the overall convergence and in the upper tail convergence. It is seen numerically that the proposed series fits the upper tail distribution first. Now, we shall prove this property of the proposed series. However, it is a difficult problem to prove this property in general cases. Thus, in the next subsection, we provide a proof of this property when the number of distinct eigenvalues of the covariance matrix Σ is one, e.g., in the i.i.d. case. 1) The identity covariance matrix case: Suppose that there is only one eigenvalue, λ (> 0), with multiplicity κ for the covariance matrix Σ. This case corresponds to Corollary 4, and the outage probability June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
34
0
1.2
10
15 [Laguerre]
Proposed expression Laguerre polynomial (β=1)
1 0.8
−2
10
5 [Laguerre]
CDF MSE
Pr{Y ≤ y}
0.6 0.4 0.2 15 [Proposed]
0
−4
10
−6
10
5 [Proposed]
−0.2
Empirical distribution Proposed expression Laguerre polynomial
−0.4 −0.6 0
5
y
10
−8
10
15
0
(a) Fig. 13.
10
20 Order
30
40
(b)
¯ = I, and Σ = [0.2641 0.0328 0.1963 0.1140; 0.0328 0.6097 − number of variables = 4, µ = 0.51, Q
0.1739 0.1708; 0.1963 − 0.1739 0.8746 − 0.0022; 0.1140 0.1708 − 0.0022 0.1250]. In this case eigenvalues are 1.0000, 0.6318, 0.2158, and 0.0259 with β = 1. (a) CDF, (b) CDF MSE. Uniform sample of y is taken over [0, 15.9].
is given by Pr{Y ≤ y} = 1 +
∞ y X (η 2 /λ)n−κ+1 exp(−η 2 ) (n) g (0, y) exp − , λκ λ n!(n − κ + 1)!
(54)
n=κ−1
where g(s, y) =
and η 2 =
Pκ
is given by
j=1 |χ
(j) |2 .
eys s − λ−1
(55)
The residual error caused by truncating the infinite series after the first N terms
∞ y X exp(−η 2 ) (η 2 /λ)n−κ+1 (n) RN (y) = g (0, y) . exp − λκ λ n!(n − κ + 1)!
(56)
n=N +1
Before we proceed, we first obtain the n-th derivative of g(s, y) at s = 0, which is given in the following lemma. Lemma 1: For n ≥ 0, g
June 28, 2012
(n)
(0, y) = −λ
n X k=0
n! λk y n−k . (n − k)!
(57)
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
35
Proof: Proof is given by induction. The validity of the claim for n = 0, 1 and 2 is shown by direction computation: 0 X 0! yeys λk y 0−k , = −λ = −λ g (0, y) = s − 1/λ s=0 (0 − k)! k=0 1 ys ys X ye (s − 1/λ) − e 1! g(1) (0, y) = = −λ(y + λ) = −λ λk y 1−k , 2 (s − 1/λ) (1 − k)! s=0 (0)
g
(2)
(0, y) =
(yeys (ys
− y/λ − 1) +
eys y) (s
= − λ(y 2 + 2λy + 2λ2 ) = −λ
1 2 λ)
− − 4 (s − 1/λ) 2 X k=0
k=0 ys 2e (ys −
2! λk y 2−k . (2 − k)!
y/λ − 1)(s − λ1 )
s=0
Now, suppose that (57) holds up to the (n − 1)-th derivative of g(s, y). From the recursive formula in
(48), g(n) (0, y) is obtained as
g(n) (0, y) n−1 X n − 1 = g(k) (0, y)(log g(0, y))(n−k) k k=0 n − 1 (0) n − 1 (1) (n) = g (0, y)(log g(0, y)) + g (0, y)(log g(0, y))(n−1) + · · · 0 1 n − 1 (n−1) + g (0, y)(log g(0, y))(1) . n−1
(58)
Since [log g(s)] = ys − log(s − 1/λ), we can easily see that [log g(0)](1) = y + λ and [log g(0)](n) = (n − 1)!λn for n ≥ 2. Therefore, (58) can be rewritten as g
(n)
n
(0, y) =(n − 1)!g(0, y)λ + (n − 1)g
(1)
(0, y)(n − 2)!λ
n−1
n − 1 (2) + g (0, y)(n − 3)!λn−2 + · · · 2
+(n − 1)g(n−2) (0, y)λ2 + g(n−1) (0, y)(y + λ) =(n − 1)!g(0, y)λn + (n − 1)!g(1) (0, y)λn−1 +
(n − 1)! (2) g (0, y)λn−2 + · · · 2
+ (n − 1)g(n−2) (0, y)λ2 + λg (n−1) (0, y) + yg(n−1) (0, y) "n−1 ! # n−1 l X (n − 1)! X X (n − 1)! l! (a) n−l k l−k m n−m−1 = −λ λ +y λ y λ y l! (l − k)! (n − m − 1)! m=0 l=0 k=0 "n−1 ! # n−1 l X (n − 1)! X X (n − 1)! l! n−l k l−k m n−m =−λ λ + λ y λ y l! (l − k)! (n − m − 1)! l=0
m=0
k=0
where (a) holds since (57) holds for all
(59)
g(0) (0, y), · · ·
, g(n−1) (0, y)
by the induction assumption.
Here, consider the coefficient of each y i in (59) for i = 0, · · · , n. June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
36
i) y n is obtained only when m = 0. The coefficient of y n from (59) is therefore given by −λ. It
corresponds to the coefficient of y n in (57).
ii) For 0 < p ≤ n, the coefficient of y n−p is obtained by considering all (l, k) that satisfies l − k = n − p due to the first term in the right-hand side (RHS) of (59), and m = p due to the second term
of the RHS of (59). In the first case, we obtain y n−p with the following pairs (l, k) = (n − 1, p − 1),
(n − 2, p − 2), · · · , (n − p, 0). For these (l, k) pairs, we have n−1 n−1 X X (n − 1)! (n − 1)! l! (n − 1)! p n−p l−n+p n−p −λ · λ y λp y n−p = −λp λ y . ·λn−l = −λ l! (n − p)! (n − p)! (n − p)! l=n−p l=n−p (60)
In the second case of m = p, we have −λ
(n − 1)! λp y n−p . (n − p − 1)!
(61)
Finally, the coefficient of y n−q is given by adding (60) and (61): ! (n − 1)! (n − 1)! λp y n−p +p −λ (n − p − 1)! (n − p)! ! p (n − 1)! 1+ λp y n−p = −λ (n − p − 1)! n−p = −λ
n! λp y n−p , (n − p)!
which is equivalent to the coefficient for y n−p in (57) (0 < p ≤ n). Thus, (57) holds for g(n) (0, y). Note that g(n) (0, y) < 0 for all n ≥ 0 from (57). Therefore, RN (y) ≤ 0 for all N and y and |g(n) (0, y)| =
−g(n) (0, y).
Now, consider the residual error term RN (y) in (56). The magnitude of the residual error can be upper
June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
37
bounded as follows: |RN (y)|
=
∞ y X exp(−η 2 ) (η 2 /λ)n−κ+1 (n) |g (0, y)| · exp − λκ λ n!(n − κ + 1)! n=N +1
=
=
=
= (a)
exp(−η 2 ) λκ − −
∞ y X (η 2 /λ)n−κ+1 · exp − (−g(n) (0, y)) λ n!(n − κ + 1)! n=N +1
exp(−µ2 ) λκ
∞ y X (η 2 /λ)n−κ+1 g(n) (0, y) · exp − λ n!(n − κ + 1)!
y exp(−η 2 ) · exp − λκ λ
−(2λ)κ−1 ·
exp(−η 2 ) λκ
n=N +1 ∞ X
n=N +1
1 n (2η 2 )n−κ+1 (2λ)κ−1 1 (n) g (0, y) n! 2λ (n − κ + 1)!
∞ 1 n (2η 2 )n−κ+1 y X 1 (n) g (0, y) · exp − λ n! 2λ (n − κ + 1)!
y exp(−η 2 ) · exp − λκ λ
n=N +1 ∞ X
1 n 1 (n) exp(2η 2 ) g (0, y) n! 2λ
≤
−(2λ)κ−1 ·
=
∞ y X 1 n 2κ−1 1 (n) − exp(η 2 ) · exp − g (0, y) λ λ n! 2λ
n=N +1
n=N +1
∞ y X 1 n 1 (n) ≤ − · exp(η 2 ) · exp − g (0, y) λ λ n! 2λ n=0 y 2κ−1 1 (c) = − ·g exp(η 2 ) · exp − ,y λ λ 2λ y exp(y/2λ) 2κ−1 (d) = − · exp(η 2 ) · exp − λ λ −1/2λ y (62) = 2κ exp(η 2 ) · exp − 2λ P k p where (a) is from γk! ≤ exp(γ) = ∞ p=0 γ /p! for any γ > 0, (b) is from the fact that summand is (b)
2κ−1
negative, (c) is by using the Taylor series expansion, and (d) is from (55). Since η is a fixed constant, from (62), for any N ≥ 0 lim |RN (y)| = 0.
y→∞
(63)
Thus, it is clear that the proposed series converges from the upper tail distribution! Now, let us consider the residual error magnitude as a function of y for given N . From (57), we have ∂g(n) (0, y) = ng (n−1) (0, y). ∂y
June 28, 2012
(64)
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
38
Differentiating RN (y) with respect to y yields ∞ y X ∂RN (y) (η 2 /λ)n−κ+1 exp(−η 2 ) 1 g(n) (0, y) = − exp − κ ∂y λ λ λ n!(n − κ + 1)! n=N +1
∞ y X ∂g(n) (0, y) (η 2 /λ)n−κ+1 exp − · + λκ λ ∂y n!(n − κ + 1)! n=N +1 ∞ y X (η 2 /λ)n−κ+1 1 (n) exp(−η 2 ) (n−1) (0, y) . exp − − g (0, y) + ng = λκ λ n!(n − κ + 1)! λ
exp(−η 2 )
(65)
n=N +1
Furthermore, from (57) we have
−
1 (n) g (0, y) + ng(n−1) (0, y) = y n . λ
(66)
By substituting (66) into (65), we have ∂RN (y) ∂y
=
∞ y X exp(−η 2 ) (η 2 /λ)n−κ+1 y n exp − , λκ λ n!(n − κ + 1)!
(67)
n=N +1
which is positive. Since RN (y) ≤ 0, limy→∞ RN (y) = 0 and
∂RN (y) ∂y
> 0, the residual error magnitude
monotonically decreases as y increases and the maximum error occurs at y = 0 for any given N . Now, let us compute the worst truncation error RN (0), which is given by ∞ (η 2 /λ)n−κ+1 exp(−η 2 ) X (n) . g (0, 0) RN (0) = λκ n!(n − κ + 1)!
(68)
n=N +1
From (57), we have g(n) (0, 0) = −n!λn+1 . Therefore, ∞ 2 n−κ+1 exp(−η 2 ) X n+1 (η /λ) RN (0) = (−n!λ ) λκ n!(n − κ + 1)! =− =−
n=N +1 ∞ X
exp(−η 2 ) λκ
n=N +1 ∞ exp(−η 2 ) X
λκ
= − exp(−η 2 )
n=N +1 ∞ X
n=N +1
λn+1
(η 2 /λ)n−κ+1 (n − κ + 1)!
(η 2 )n−κ+1 · λκ (n − κ + 1)! (η 2 )n−κ+1 . (n − κ + 1)!
(69)
From (54), N ≥ κ − 2. For general N ≥ κ − 2, let m = n − κ + 1. Then, ∞ X (η 2 )m 2 . RN (0) = − exp(−η ) m! m=N −κ+2 P (η2 )m Note that ∞ m=N −κ+2 m! is the residual error of the Taylor series expansion of exp(x) after the first (N − κ + 1) terms. By the Taylor theorem, ∞ X (η 2 )m m=N −κ+2
June 28, 2012
m!
=
(η 2 )N −κ+2 exp(αη 2 ) (N − κ + 2)!
(70)
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
39
where some α ∈ [0, 1]. Therefore, the worst truncation error is given by (η 2 )N −κ+2 (η 2 )N −κ+2 2 |RN (0)| = exp (α − 1)η × ≤ , (N − κ + 2)! (N − κ + 2)!
(71)
where the inequality holds since exp((α − 1)η 2 ) ≤ 1 for 0 ≤ α ≤ 1. Furthermore, the residual error magnitude is a strictly decreasing function of N for any y , |RN (y)| > |RN +1 (y)|.
(72)
This can be shown easily as follows. ∞ y X (η 2 /λ)n−κ+1 exp(−η 2 ) exp − g (n) (0, y) RN (y) = κ λ λ n!(n − κ + 1)! n=N +1 ( ∞ ) y X exp(−η 2 ) (η 2 /λ)N −κ+2 (η 2 /λ)n−κ+1 (N +1) (n) = exp − +g (0, y) g (0, y) λκ λ n!(n − κ + 1)! (N + 1)!(N − κ + 2)! n=N +2
=RN +1 (y) +
exp(−η 2 ) λκ
y (η 2 /λ)N −κ+2 · g (N +1) (0, y) . exp − λ (N + 1)!(N − κ + 2)!
Since RN (y) < 0 and g(N +1) (y) < 0 for all y ≥ 0 and N , we have (72). Now, based on (71) and (72), with given χk and σh2 , we can compute the required number N of terms in the series to achieve the
desired level of accuracy since η 2 is known.
1.2 1
N=5
0
N=10 −0.2 RN (y)
Pr{Y ≤ y}
0.8 0.6
N=15
−0.4 −0.6
0.4 N=15
N=10
0.2 0 0
−0.8
Empirical distirbution Proposed expression
N=20 1
2 y
3
N=5 4
−1 0
(a) CDF Fig. 14.
N=20
1
2 y
3
4
(b) Residual error
¯ = I, and Σ = 0.1I. number of variables = 4, µ = 0.51, Q
Finally, consider the worst case of N = κ − 2 and y = 0: Rκ−2 (0) = − exp(−η 2 ) June 28, 2012
∞ X
n=κ−1
∞
X (η 2 )m (η 2 )n−κ+1 = − exp(−η 2 ) = −1, (n − κ + 1)! m! m=0
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
40
where the second equality is by replacing m = n − κ + 1. It is easy to see that the worst case error is -1 in the identity covariance matrix case. Fig. 14 shows the performance of the proposed series expansion in the case of the identity covariance matrix. The numerical results well match our theoretical analysis in this subsection. From the figure, it seems reasonable to choose N ≥ 20 ∼ 30 for accurate outage probability computation. R EFERENCES [1] J. Park, D. Kim and Y. Sung, “Sum outage-rate maximization for MIMO interference channels,” in Proc. of IEEE Global Telecommunications Conf., (Houston, TX), Dec. 2011. [2] V. R. Cadambe and S. A. Jafar, “Interference alignment and degrees of freedom of the K-user interference channel,” IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3425 – 3441, Aug. 2008. [3] K. Gomadam, V. R. Cadambe, and S. A. Jafar, “A distributed numerical approach to interference alignment and applications to wireless interference networks,” IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3309 – 3322, Jun. 2011. [4] S. W. Peters and R. W. Heath, “Cooperative algorithms for MIMO interference channels,” IEEE Trans. Veh. Technol., vol. 60, no. 1, pp. 206 – 218, Jan. 2011. [5] H. Yu and Y. Sung, “Least squares approach to joint beam design for interference alignment in multiuser multi-input multi-output interference channels,” IEEE Trans. Signal Process., vol. 58, no. 9, pp. 4960 – 4966, Sep. 2010. [6] I. Santamaria, O. Gonzalez, R. W. Heath, and S. W. Peters, “Maximum sum-rate interference alignment algorithms for MIMO channels,” in Proc. of IEEE Global Telecommunications Conf., (Miami, FL), Dec. 2010. [7] D. Schmidt, S. Changxin, R. Berry, M. Honig, and W. Utschick, “Minimum mean squared error interference alignment,” in Proc. of 43rd Asilomar Conf. on Signals, Systems and Computers, (Pacific Grove, CA), Nov. 2009. [8] F. Negro, S. P. Shenoy, I. Ghauri, and D. T. M. Slock, “Weighted sum rate maximization in the MIMO interference channel,” in Proc. of IEEE 21st Int. Symp. on Personal Indoor and Mobile Radio Commun., (Istanbul, Turkey), Sep. 2010. [9] J. Shin and J. Moon, “Weighted sum rate maximizing transceiver design in MIMO interference channel,” in Proc. of IEEE Global Telecommunications Conf., (Houston, TX), Dec. 2011. [10] E. Biglieri et al., MIMO Wireless Communications, Cambridge, UK: Cambridge University Press, 2007. [11] J. Lindblom, E. Karipidis, and E. Larsson, “Outage rate regions for the MISO interference channel: Definitions and interpretations,” ArXiv pre-preints cs.IT/1106.5615v1, Jun. 2011. [12] J. Lindblom, E. Larsson, and E. Jorswieck, “Parametrization of the MISO IFC rate region: The case of partial channel state information,” IEEE Trans. Wireless Commun., vol. 9, no. 2, pp. 500–504, Feb. 2010. [13] W.-C. Chiang, T.-H. Chang, C. Lin, and C.-Y. Chi, “Coordinated beamforming for multiuser MISO interference channel under rate outage constraints,” ArXiv pre-preints cs.IT/1108.4475v1, Aug. 2011. [14] E. Chiu, V. Lau, H. Huang, T. Wu, and S. Liu, “Robust transceiver design for K-pairs quasi-static MIMO interference channels via semi-definite relaxation,” IEEE Trans. Wireless Commun., vol. 9, no. 12, pp. 3762 – 3769, Dec. 2010. [15] H. Shen, B. Li, M. Tao, and X. Wang, “MSE-based transceiver designs for the MIMO interference channel,” IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3480 – 3489, Nov. 2010. [16] S. Ghosh, B. Rao, and J. Zeidler, “Outage-efficient strategies for multiuser MIMO networks with channel distribution information,” IEEE Trans. Signal Process., vol. 58, no. 12, pp. 6312 – 6323, Dec. 2010. [17] H. V. Poor, An Introduction to Signal Detection and Estimation, 2nd ed., New York: Springer, 1994. June 28, 2012
DRAFT
ACCEPTED TO IEEE TRANS. WIRELESS COMMUN., JUNE 28, 2012
41
[18] B. Nosrat-Makouei, J.G. Andrews, and R.W. Heath, “MIMO interference alignment over correlated channels with imperfect CSI,” IEEE Trans. Signal Process., vol. 59, no. 6, pp. 2783 – 2794, Jun. 2011. [19] J. Gurland, “Distribution of definite and of indefinite quadratic forms,” Ann. of Math. Stat., vol. 26, no. 1, pp. 122 – 127, Mar. 1955. [20] S. Kotz, N. L. Johnson, and D. W. Boyd, “Series representation of distributions of quadratic forms in normal variables. I. Central case,” Ann. of Math. Stat., vol. 38, no. 3, pp. 823 – 837, Jun. 1967. [21] S. Kotz, N. L. Johnson, and D. W. Boyd, “Series representation of distributions of quadratic forms in normal variables. II. Non-central case,” Ann. of Math. Stat., vol. 38, no. 3, pp. 838 – 848, Jun. 1967. [22] D. Raphaeli, “Distribution of noncentral quadratic forms in complex normal variables,” IEEE Trans. Inf. Theory, vol. 42, no. 3, pp. 1002 – 1007, May 1996. [23] R. Nabar, H. Bolcskei, and A. Paulraj, “Diversity and outage performance of space-time block coded ricean MIMO channels,” IEEE Trans. Wireless Commun., vol. 4, no. 5, pp. 2519 – 2532, Sep. 2005. [24] M. O. Hasna, M. S. Alouini, and M. K. Simon, “Effect of fading correlation on the outage probability of cellular mobile radio systems,” in Proc. of IEEE Veh. Tech. Conf., (Atlantic City, NJ), pp. 1794 – 1998, Oct. 2001. [25] T. Al-Naffouri and B. Hassibi, “On the distribution of indefinite quadratic forms in Gaussian random variables,” in Proc. of IEEE Int. Symp. Inf. Theory, (Seoul, Korea), Jun. – Jul. 2009. [26] A. Mathai and S. Provost, Quadratic Forms in Random Variables: Theory and Applications, New York: M. Dekker, 1992. [27] H. Sung, S. Park, K. Lee, and I. Lee, “Linear precoder designs for K-user interference channels,” IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 291 – 301, Jan. 2010. [28] I. Csisz´ar and P. C. Shields, Information Theory and Statistics: A Tutorial, Hanover, MA: Now Publishers Inc., 2004. [29] E.-V. Belmega, S. Lasaulce, and M. Debbah, “Power allocation games for MIMO multiple access channels with coordination,” IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 3182 – 3192, Jun. 2009. [30] A. Hjørungnes and D. Gesbert, “Precoding of orthogonal space-time block codes in arbitrarily correlated MIMO channels: Iterative and closed-form solutions,” IEEE Trans. Wireless Commun., vol. 6, no. 3, pp. 1072 – 1082, Mar. 2007.
June 28, 2012
DRAFT